Hauck, US
Anthony L. Hauck, Huntington Beach, CA US
Patent application number | Description | Published |
---|---|---|
20090143148 | FLEXIBLE COUPLINGS - A flexible coupling including a first hub having an inner face, a flexible insert having a plurality of exterior lobes and a plurality of interior lobes, a retainer ring having an interior which engages the exterior lobes of the flexible insert, and a second hub having an exterior surface contoured to engage the interior lobes of the flexible insert. | 06-04-2009 |
Arthur J. Hauck, Kansas City, MO US
Patent application number | Description | Published |
---|---|---|
20090112631 | SYSTEM AND METHOD FOR AUTOMATICALLY NOTIFYING A BLOOD BANK DATABASE OF BLOOD PRODUCT ADMINISTRATION AND TRANSFUSION - In one embodiment the present invention relates to a method for automatically tracking blood product administration in a computerized healthcare environment. Information regarding a blood product unit received by the blood bank department is documented in a database. An indication that the blood product unit has been administered to the patient by a healthcare provider is received and the database is automatically updated to reflect that the blood product unit has been administered to the patient. The present invention also relates to a method for automatically notifying a blood bank database of administration of a blood product to a patient in a computerized healthcare environment is provided. | 04-30-2009 |
20100179820 | AUTOMATED ANALYSIS OF DATA COLLECTED BY IN-VIVO DEVICES - Systems and methods for operably coupling medical device(s) together with an evaluation device such that closed-loop processing may occur are provided. To achieve closed-loop processing, the evaluation device is configured to receive diagnostic information related to physiological attributes of a patient and operational-status information of the medical device(s). Upon receipt of this information, the evaluation device may automatically analyze the data and automatically compose instructions based on the analysis. Analyzing includes comparing the data against content within an electronic medical record (EMR) or applying rules to the data. The rules are built on evidence-based medical procedures consistent with current medical practice. The instructions, when distributed and implemented, invoke actions at the medical device(s), such as dispensing a medication and reprogramming configuration settings, as well as actions at a notification component configured to request a healthcare professional to intervene in a patient's treatment and to provide feedback of medical events. | 07-15-2010 |
Bernd Hauck, Hamilton, NJ US
Patent application number | Description | Published |
---|---|---|
20130072548 | Scalable Manufacturing Platform for Viral Vector Purification and Viral Vectors So Purified for Use in Gene Therapy - Methods for preparing highly purified AAV vector formulations are provided. The highly pure AAV formulations described herein are superior for clinical use. | 03-21-2013 |
20140037585 | AAV8 Vector with Enhanced Functional Activity and Methods of Use Thereof - Improved compositions and methods for AAV mediated gene therapy are disclosed. | 02-06-2014 |
20140349403 | LARGE COMMERCIAL SCALE LENTIVIRAL VECTOR PRODUCTION SYSTEM AND VECTORS PRODUCED THEREBY - In accordance with the present invention, a method for increasing the yield of rLV vector particles comprising a trans gene encoding a therapeutic protein or fragment thereof is disclosed. In one approach, cells are transfected with plasmids encoding the necessary components for rLV production using a calcium chloride transfection mix at pH 7.1 wherein the calcium chloride and plasmids form a complex which is added to the cells at a constant speed. The cells are then incubated for a suitable time period wherein virus particle media is collected at least twice during the incubation period and stored in a cold storage unit, thereby reducing virus inactivation. | 11-27-2014 |
Brian A. Hauck, Windsor, CA US
Patent application number | Description | Published |
---|---|---|
20090018542 | FRACTURE FIXATION DEVICES, SYSTEMS AND METHODS INCORPORATING A MEMBRANE - A bone fixation device having an elongate body, an actuateable gripper disposed on the elongated body, an actuator operably connected to the gripper to deploy the gripper from a retracted configuration to an expanded configuration, and a membrane surrounding at least a portion of the elongate body or the gripper is disclosed. Also disclosed are systems, surgical kits and methods of using a bone fixation device with a membrane cover. | 01-15-2009 |
20110144645 | Fracture Fixation Device, Tools and Methods - A bone fixation device is provided with an elongate body having a longitudinal axis and having a flexible state and a rigid state, a plurality of grippers disposed at longitudinally spaced locations of the elongated body, a curved rigid hub connected to the elongated body, and an actuator operably connected to the grippers to deploy the grippers from a first shape to an expanded second shape. Methods of repairing a fracture of a bone are also disclosed. One such method comprising inserting a bone fixation device into an intramedullary space of the bone to place at least a portion of an elongate body of the fixation device in a flexible state on one side of the fracture and at least a portion of a curved rigid hub on another side of the fracture, and operating an actuator to deploy a plurality of grippers of the fixation device to engage an inner surface of the intramedullary space to anchor the fixation device to the bone. | 06-16-2011 |
20130231665 | FRACTURE FIXATION DEVICE, TOOLS AND METHODS - Bone fixation methods and devices with an elongate body having a longitudinal axis and having a flexible state and a rigid state, a plurality of grippers, a rigid hub connected to the elongated body, and an actuator operably connected to the grippers to deploy the grippers from a first shape to an expanded second shape. One method can include inserting a bone fixation device into an intramedullary space of the bone to place at least a portion of an elongate body of the fixation device in a flexible state on one side of the fracture and at least a portion of a rigid hub on another side of the fracture, and operating an actuator to deploy a plurality of grippers of the fixation device to engage an inner surface of the intramedullary space to anchor the fixation device to the bone. | 09-05-2013 |
Brian Albert Hauck, Windsor, CA US
Patent application number | Description | Published |
---|---|---|
20140067073 | MEMORY MATERIAL IMPLANT SYSTEM AND METHODS OF USE - Apparatus and method used to reduce the movement between vertebrae or fractured bones. The implantable device can be deformed from its shape-set configuration for ease of deployment and return to a pre-set shape upon completion of deployment. The apparatus can serve to stabilize fractured bones or as a distraction device and support structure between vertebrae. Device may be made of a material with shape memory and superelastic properties which facilitate the method of implantation. The pre-set shape of the device may include dimensions/geometries which are similar to the natural curvature of the human spine or bone without the use of hinging or connection between multiple pieces. Once deployed, the device can serve to constrain the flow of bone growth material between the inside and outside of the device. | 03-06-2014 |
Chris Hauck, Boulder, CO US
Patent application number | Description | Published |
---|---|---|
20130073339 | DEVICES, SYSTEMS, AND METHODS FOR ACQUIRING UNSOLICITED CONSUMER COMMENTS - Methods, systems, and devices are described for acquiring unsolicited consumer comments. Input from a user indicating that the user has one or more unsolicited comments directed to an establishment or an entity associated with a product may be received at a user device. The establishment or the product to which the user has the one or more directed unsolicited comments may be determined at the user device. A comment input interface to receive the one or more unsolicited comments regarding the establishment or the product from the user may be presented through the user device. The one or more unsolicited comments from the user may be received at the user device. The one or more received unsolicited comments may be transmitted, from the user device, to a comment processor system to prepare for presentation to the establishment or the entity associated with the product. | 03-21-2013 |
Christopher F. Hauck, Cincinnati, OH US
Patent application number | Description | Published |
---|---|---|
20130211886 | SYSTEM AND METHODS FOR UNIVERSALLY ADMINISTERING MERCHANTS' LOYALTY PROGRAMS - A method for administering the loyalty programs of multiple merchants. The method includes enrolling a plurality of customers in a universal system for administering multiple loyalty programs. The method further includes receiving lookup requests from a plurality of distinct merchants, each lookup requests relating to a customer's wish to receive loyalty program benefits from a merchant. The method further includes providing computerized customer record information in response to each lookup request, the customer record information being used by the merchants for invoking each merchant's respective loyalty program and providing loyalty benefits to the customer. | 08-15-2013 |
Eric W. Hauck, Lexington, KY US
Patent application number | Description | Published |
---|---|---|
20150293091 | METHOD FOR THE QUANTIFICATION OF PARASITE EGGS IN FECES - Method and kits are provided determining the presence or absence of parasitic helminth eggs in environmental samples, particularly fecal samples. The methods incorporate egg capture methods and the use of N-acetyl-D-glucosamine specific ligands for egg detection. | 10-15-2015 |
Gregory Hauck, Valencia, CA US
Patent application number | Description | Published |
---|---|---|
20110282405 | SYSTEMS AND METHODS FOR USE WITH AN IMPLANTABLE MEDICAL DEVICE FOR DISCRIMINATING VT AND SVT BE SELECTIVELY ADJUSTING ATRIAL CHANNEL SENSING PARAMETERS - Techniques are described for discriminating ventricular tachycardia (VT) from supraventricular tachycardia (SVT) in circumstances when the ventricular rate exceeds the atrial rate (i.e. V>A). In one example, an initial atrial rate is detected while employing adjustable atrial channel detection parameters that can affect the detection of the true atrial rate—such as a post-ventricular atrial blanking (PVAB) interval or an atrial channel sensitivity level. If the ventricular rate exceeds a VT rate zone threshold with V>A, the device does not immediately deliver high voltage shock therapy as done in other devices. Rather, the device instead selectively adjusts the atrial channel detection parameter(s) to determine if the true atrial rate is equal to the ventricular rate. If so, then such is an indication that the arrhythmia might be SVT rather than VT and various discrimination procedures are employed to distinguish SVT from VT before therapy is delivered. | 11-17-2011 |
Jacob A. Hauck, Hastings, MN US
Patent application number | Description | Published |
---|---|---|
20140328638 | Self-Aligning Automatically Driving Drill Apparatus - A handheld power drill apparatus includes a drill motor, a carriage motor, a drilling implement with an interchangeable locking chuck, an electronic controller, and guide plates. The guide plate is slidably mounted to accommodate different work piece thicknesses. The drilling implement is coaxially mounted on a lead screw mounting plate. The drilling implement is positioned substantially orthogonal to the workpiece. The drilling implement is automatically driven into a workpiece by the carriage motor. | 11-06-2014 |
James Pierre Hauck, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20120132353 | Graphene Production Using Laser Heated Crystal Growth - Implementations and techniques for producing graphene are generally disclosed. | 05-31-2012 |
20130312662 | GRAPHENE PRODUCTION USING LASER HEATED CRYSTAL GROWTH - Implementations and techniques for producing graphene are generally disclosed. | 11-28-2013 |
Jeremy Hauck, San Fernando, CA US
Patent application number | Description | Published |
---|---|---|
20120204712 | DUAL ACTION SHOTGUN - The dual action shotgun includes a receiver that has an auto-loading mechanism coupled to a magazine. The magazine extends outwardly from the receiver to facilitate sliding movement of an action arm thereon relative to the receiver. A manually operable foregrip also slidable along the magazine is positioned to manually operate the action arm to prepare a cartridge and the firing mechanism of the shotgun independent of the operation of the auto-loading mechanism. | 08-16-2012 |
Jerrold Hauck, Windermere, FL US
Patent application number | Description | Published |
---|---|---|
20130227646 | METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONIC ACCESS CLIENTS - Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs) | 08-29-2013 |
Jerrold V. Hauck, Windermere, FL US
Patent application number | Description | Published |
---|---|---|
20100333055 | INTEGRATED CIRCUIT HAVING SECURE ACCESS TO TEST MODES - Methods for enabling a secure test mode, and integrated circuits (IC's) implementing the same are disclosed. An IC may include a secure functional unit that is protected from access from test access circuitry during normal operation. The secure functional unit may be rendered inaccessible the test access circuitry of the IC following a completion of a test that includes testing of the secure functional unit. An embodiment of an IC that includes circuitry to delay entry into a test mode while a chip-level reset is performed is also contemplated. Entry into the test mode may be delayed until all circuitry of the IC has been fully reset in order to clear stored information. | 12-30-2010 |
20110292944 | FLY-BY AND ACK-ACCELERATED ARBITRATION FOR BROADCAST PACKETS - A method for administering transmission of a first type of packets and a second type of packets over a serial bus is disclosed. The method comprises: if there is a packet of a second type to be sent, then concatenating the packet of the second type to a plurality of packets of the first type and sending the plurality of packets of the first type followed by the concatenated packet of the second type; and if there is no packet of the second type to be sent, then concatenating a bogus ack packet to the plurality of packets of the first type and sending the plurality of packets of the first type followed by the concatenated bogus ack packet. | 12-01-2011 |
20120309348 | ACTIVATION SOLUTION - To securely factory activate a mobile device according to authorized records, factory activation server generates and sends a signed factory activation record including a signed factory activation ticket. Signed factory activation record and ticket are cryptographically signed using factory private key stored in factory activation server. Factory private key is different from customer private key stored in the activation server that provides activation tickets for customer activation. If factory activation record is valid, application processor (AP) included in the device performs factory activation of the device which includes AP activating to allow for factory testing and rebooting at a predetermined reboot time. Wireless communication processor (BB) included in the device verifies the factory activation ticket and if valid, BB performs factory activation including: BB registering to a cellular telephone communications network for factory testing, and unregistering from the network after a predetermined unregistering time. Other embodiments are also described. | 12-06-2012 |
20120311313 | TICKET-BASED PERSONALIZATION - Securely installing and booting software of a device to run OS authorized according to a ticket that is validated by a nonce generated by application processor (AP) in booted OS stage prior to entering a restore mode is described. AP in booted OS stage generates a pre-flight nonce that is stored in a trusted location (effaceable storage). AP in booted OS stage performs one-way hash of pre-flight nonce and sends the hashed pre-flight nonce to ticket authorization server. AP enters restore mode. AP in first stage bootloader receives a ticket from the ticket authorization server including a signed copy of the hashed pre-flight nonce. AP in first stage bootloader validates the signed ticket by comparing one-way hash of the pre-flight nonce stored in the trusted location and the hashed nonce in the signed ticket. Pre-flight nonce expires after timeout period and upon reboot of AP. Other embodiments are also described. | 12-06-2012 |
20130024593 | SOURCE PACKET BRIDGE - A communication function between ports on a node that does not require a common time base to be distributed across the network is disclosed. A data stream received over a first port is placed on an interface between nodes using the time base of the first port; a second port samples the data stream on the interface and timestamps it using the time base of the second port. The data stream is timestamped by the second port and packetized before transmitted to the second node to another bridge or device. Alternatively, the first port extracts a time stamp from the data stream and calculates an offset using a cycle timer value from the bus connected to the first port. The offset is added to the cycle timer value on the bus connected to the second port and used to timestamp the data stream. | 01-24-2013 |
20140093084 | Secure Escrow Service - A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key. | 04-03-2014 |
20140143826 | POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL - A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities. | 05-22-2014 |
20150261966 | SECURE FACTORY DATA GENERATION AND RESTORATION - In various embodiments, methods, devices and systems for securely generating, sealing, and restoring factory-generated calibration and provisioning data for an electronic device are described, in which calibration and provisioning data for an electronic device are generated in a distributed manner and stored on a storage system. The calibration data can be retrieved from the storage system during device assembly and finalized calibration and provisioning data for each electronic device can be stored to the storage system. In one embodiment, a sealing server, to attest to the authenticity of the factory-generated data, seals the finalized calibration data. In one embodiment, an electronic device can access a data store containing the factory-generated data and can update or restore calibration or provisioning data for the device from the data store. | 09-17-2015 |
20150348007 | Apparatuses and Methods for Operating a Portable Electronic Device to Conduct Mobile Payment Transactions - Methods for operating a portable electronic device to conduct a mobile payment transaction at a merchant terminal are provided. The electronic device may verify that the current user of the device is indeed the authorized owner by requiring the current user to enter a passcode. If the user is able to provide the correct passcode, the device is only partly ready to conduct a mobile payment. In order for the user to fully activate the payment function, the user may have to supply a predetermined payment activation input such as a double button press that notifies the device that the user intends to perform a financial transaction in the immediate future. The device may subsequently activate a payment applet for a predetermined period of time during which the user may hold the device within a field of the merchant terminal to complete a near field communications based mobile payment transaction. | 12-03-2015 |
20150348022 | Apparatuses and Methods for Using a Random Authorization Number to Provide Enhanced Security for a Secure Element - A system for provisioning credentials onto an electronic device is provided. The system may include a payment network subsystem, a service provider subsystem, and one or more user devices that can be used to perform mobile transactions at a merchant terminal. The user device may communicate with the service provider subsystem in order to obtained commerce credentials from the payment network subsystem. The user device may include a secure element and a corresponding trusted processor. The trusted processor may generate a random authorization number and inject that number into the secure element. Mobile payments should only be completed if the random authorization number on the secure element matches the random authorization number at the trusted processor. The trusted processor may be configured to efface the previous random authorization number and generate a new random authorization number when detecting a potential change in ownership at the user device. | 12-03-2015 |
20160004884 | Secure Escrow Service - A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys. The method receives the encrypted confidential information items in a secure object which is encrypted with a user-specific key and the public key. The method only provides the confidential information to the second device when the second device provides the same user-specific key as the key that encrypts the secure object and the hash of the executable code of the servers at the time of accessing the private key to decrypt the secure object matches the hash of the executable code running on the servers at the time of generating the private key. | 01-07-2016 |
Jerrold V. Hauck, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20100202314 | METHODS AND APPARATUS FOR ENSURING COMPATIBILITY ON A HIGH PERFORMANCE SERIAL BUS - A data communications system is disclosed having at least one Legacy cloud coupled to at least one Beta cloud. The system further having at least one BOSS node and at least one border node. A method for ensuring compatibility is disclosed comprising determining when the BOSS node is idle, determining whether the last packet transmitted by any border node was an Alpha format packet if the BOSS node is idle, and unlocking the Legacy cloud if the last packet transmitted by the border node was not an Alpha format packet. | 08-12-2010 |
20130058355 | METHODS AND APPARATUS FOR ENSURING COMPATIBILITY ON A HIGH PERFORMANCE SERIAL BUS - A data communications system is disclosed having at least one Legacy cloud coupled to at least one Beta cloud. The system further having at least one BOSS node and at least one border node. A method for ensuring compatibility is disclosed comprising determining when the BOSS node is idle, determining whether the last packet transmitted by any border node was an Alpha format packet if the BOSS node is idle, and unlocking the Legacy cloud if the last packet transmitted by the border node was not an Alpha format packet. | 03-07-2013 |
Jerrold V. Hauck, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20150058191 | SECURE PROVISIONING OF CREDENTIALS ON AN ELECTRONIC DEVICE - Systems, methods, and computer-readable media for provisioning credentials on an electronic device are provided. In one example embodiment, a secure platform system may be in communication with an electronic device and a financial institution subsystem. The secure platform system may be configured to, inter alia, receive user account information from the electronic device, authenticate a user account with a commercial entity using the received user account information, detect a commerce credential associated with the authenticated user account, run a commercial entity fraud check on the detected commerce credential, commission the financial institution subsystem to run a financial entity fraud check on the detected commerce credential based on the results of the commercial entity fraud check, and facilitate provisioning of the detected commerce credential on the electronic device based on the results of the financial entity fraud check. Additional embodiments are also provided. | 02-26-2015 |
20150178723 | DELETION OF CREDENTIALS FROM AN ELECTRONIC DEVICE - Systems, methods, and computer-readable media for managing credentials are provided. In one example embodiment, an electronic device may include a secure element with a security domain element stored on the secure element. The electronic device may also include a processor component that may be configured to, inter alia, permanently terminate the functionality of the security domain element, after the functionality has been permanently terminated, communicatively couple the electronic device to a trusted service manager, and transmit data to the communicatively coupled trusted service manager that may be usable by the trusted service manager to determine that the functionality has been permanently terminated. Additional embodiments are also provided. | 06-25-2015 |
Jerrold Von Hauck, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20120108207 | METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK - Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security. | 05-03-2012 |
Jerrold Von Hauck, Windemere, FL US
Patent application number | Description | Published |
---|---|---|
20150289137 | APPARATUS AND METHODS FOR CONTROLLED SWITCHING OF ELECTRONIC ACCESS CLIENTS WITHOUT REQUIRING NETWORK ACCESS - Methods and apparatuses for providing controlled switching of electronic access control clients (e.g., electronic Subscriber Identity Modules (eSIMs)) without requiring network access are set forth herein. In one embodiment, a method for swapping of subscriptions and/or profiles for without network supervision that prevents possibly malicious high frequency switching is disclosed. For example, a secure element included in a mobile device can be configured to issue, to a security module included in the mobile device, a request for the security module to carry out an authentication of a user of the mobile device. Upon determining, based on results received from the security module, that the authentication is successful, the secure element can generate one or more credits in accordance with the results, where each credit of the one or more credits can be used to carry out an eSIM management operation within the secure element. | 10-08-2015 |
Jerrold Von Hauck, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20080263247 | Gap count analysis for the P1394a BUS - A method of optimizing communication over a high-speed serial bus by minimizing the delay between packets transmitted over the bus is disclosed. The method comprises: calculating the round trip delay between PHYs connected on the bus by pinging; a bus manager sending a configuration packet to all PHYs connected on the bus, the configuration packet containing a minimum gap_count parameter value; and all PHYs connected on the bus sending packets over the bus using the minimum gap_count parameter value as a delay between packets. | 10-23-2008 |
Jerrold Von Hauck, Windermere, FL US
Patent application number | Description | Published |
---|---|---|
20100325516 | SYMBOL ENCODING FOR TOLERANCE TO SINGLE BYTE ERROR - The present invention provides a method that protects symbol types by characterizing symbols as one of two types—DATA or NON_DATA, generating a symbol characterization bit, placing the symbol characterization bit at both ends of the symbol, and transmitting the symbol with the symbol characterization bits at both ends. Thus, a single byte error may affect a type bit in two consecutive symbols, and will affect one or the other of the type bits in a single symbol, but cannot affect both type bits in a single symbol. | 12-23-2010 |
20120030537 | SYMBOL ENCODING FOR TOLERANCE TO SINGLE BYTE ERRORS - The present invention provides a method that protects symbol types by characterizing symbols as one of two types—DATA or NON_DATA, generating a symbol characterization bit, placing the symbol characterization bit at both ends of the symbol, and transmitting the symbol with the symbol characterization bits at both ends. Thus, a single byte error may affect a type bit in two consecutive symbols, and will affect one or the other of the type bits in a single symbol, but cannot affect both type bits in a single symbol. | 02-02-2012 |
20120047227 | VIRTUAL ACCESS MODULE DISTRIBUTION APPARATUS AND METHODS - Apparatus and methods for distributing electronic access client modules for use with electronic devices. In one embodiment, the access client modules are virtual subscriber identity modules (VSIMs) that can be downloaded from online services for use with cellular-equipped devices such as smartphones. The online services may include a point of sale (POS) system that sells electronic devices to users. A broker may be used to facilitate the selection of a virtual subscriber identity module. A provisioning service may also be used to provision the selected VSIM. | 02-23-2012 |
20120108205 | METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS - Methods and apparatus for secure provision of access control entities (such as electronic or virtual Subscriber Identity Module (eSIM) components) post-deployment of the host device on which the access control entity will be used. In one embodiment, wireless (e.g., cellular) user equipment is given a unique device key and endorsement certificate which can be used to provide updates or new eSIMs to the user equipment in the “field”. The user equipment can trust eSIM material delivered by an unknown third-party eSIM vendor, based on a secure certificate transmission with the device key. In another aspect, an operating system (OS) is partitioned into various portions or “sandboxes”. During operation, the user device can activate and execute the operating system in the sandbox corresponding to the current wireless network. Personalization packages received while connected to the network only apply to that sandbox. Similarly, when loading an eSIM, the OS need only load the list of software necessary for the current run-time environment. Unused software can be subsequently activated. | 05-03-2012 |
20120117635 | SIMULACRUM OF PHYSICAL SECURITY DEVICE AND METHODS - A simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in conjunction with a software emulation of the security device. In one implementation, a “faux SIM card” is provided that does not contain Subscriber Identification Module (SIM) information itself, but instead enables a user to download Electronic SIM (eSIM) information (e.g., from a network or eSIM server) which is loaded into a software emulation of a Universal Integrated Circuit Card (UICC) device. The faux card is printed with an activation code, scan pattern, or other activation or access information. The subscriber purchases the faux card, and enters the activation code into a device; the entered activation code enables the device to log onto a network, and download the appropriate eSIM data. Delivery of eSIM information as enabled by the faux card addresses deficiencies in existing SIM distribution schemes, provides users with an enhanced perception of security, and further addresses various legal requirements. | 05-10-2012 |
20120260086 | APPARATUS AND METHODS FOR DISTRIBUTING AND STORING ELECTRONIC ACCESS CLIENTS - Apparatus and methods for efficiently distributing and storing access control clients within a network. In one embodiment, the access clients include electronic Subscriber Identity Modules (eSIMs), and an eSIM distribution network infrastructure is described which enforces eSIM uniqueness and conservation, distributes network traffic to prevent “bottle necking” congestion, and provides reasonable disaster recovery capabilities. In one variant, eSIMs are securely stored at electronic Universal Integrated Circuit Card (eUICC) appliances which ensure eSIM uniqueness and conservation. Access to the eUICC appliances is made via multiple eSIM depots, which ensure that network load is distributed. Persistent storage is additionally described, for among other activities, archiving and backup. | 10-11-2012 |
20120260090 | APPARATUS AND METHODS FOR STORING ELECTRONIC ACCESS CLIENTS - Apparatus and methods for storing and controlling access control clients. In one embodiment, transmitting and receiving devices ensure that only one copy of an eSIM is active at any time. Specifically, each transferred eSIM is encrypted for the destination device; the eSIM from the source device is deleted, deactivated, or otherwise rendered unusable. Various aspects of network infrastructure are also described, including electronic Universal Integrated Circuit Card (eUICC) appliances, and mobile devices. Various scenarios for transfer of eSIMs are also disclosed. | 10-11-2012 |
20120260095 | APPARATUS AND METHODS FOR CONTROLLING DISTRIBUTION OF ELECTRONIC ACCESS CLIENTS - Apparatus and methods for controlling the distribution of electronic access clients to a device. In one embodiment, a virtualized Universal Integrated Circuit Card (UICC) can only load an access client such as an electronic Subscriber Identity Module (eSIM) according to an activation ticket. The activation ticket ensures that the virtualized UICC can only receive eSIMs from specific carriers (“carrier locking”). Unlike prior art methods which enforce carrier locking on a software application launched from a software chain of trust (which can be compromised), the present invention advantageously enforces carrier locking with the secure UICC hardware which has, for example, a secure code base. | 10-11-2012 |
20130122864 | METHODS AND APPARATUS FOR PROVIDING MANAGEMENT CAPABILITIES FOR ACCESS CONTROL CLIENTS - Methods and apparatus for managing access control clients (e.g., electronic Subscriber Identity Modules (eSIMs)). In one embodiment, secure elements (e.g., electronic Universal Integrated Circuit Cards (eUICCs)) and management entities of secure elements are associated with credentials. Post-deployment managerial operations can be executed, by transmitting the requested operation with the appropriate credentials. For example, a device can receive secure software updates to electronic Subscriber Identity Modules (eSIMs), with properly credentialed network entities. | 05-16-2013 |
20130151910 | SYMBOL ENCODING FOR TOLERANCE TO SINGLE BYTE ERRORS - The present invention provides a method that protects symbol types by characterizing symbols as one of two types—DATA or NON_DATA, generating a symbol characterization bit, placing the symbol characterization bit at both ends of the symbol, and transmitting the symbol with the symbol characterization bits at both ends. Thus, a single byte error may affect a type bit in two consecutive symbols, and will affect one or the other of the type bits in a single symbol, but cannot affect both type bits in a single symbol. | 06-13-2013 |
20130205390 | NETWORK ASSISTED FRAUD DETECTION APPARATUS AND METHODS - Methods and apparatus for detecting fraudulent device operation. In one exemplary embodiment of the present disclosure, a device is issued a user access control client that is uniquely associated with a shared secret that is securely stored within the network and the access control client. Subsequent efforts to activate or deactivate the access control client require verification of the shared secret. Each change in state includes a change to the shared secret. Consequently, requests for a change to state which do not have the proper shared secret will be disregarded, and/or flagged as fraudulent. | 08-08-2013 |
20140088731 | APPARATUS AND METHODS FOR CONTROLLED SWITCHING OF ELECTRONIC ACCESS CLIENTS WITHOUT REQUIRING NETWORK ACCESS - Methods and apparatus for providing controlled switching of electronic access control clients without requiring network access are set forth herein. In one embodiment, a method for swapping of subscriptions and/or profiles for electronic Subscriber Identity Modules (eSIMs) without network supervision that prevents possibly malicious high frequency switching is disclosed. The disclosed embodiments offer reasonable management capabilities for network operators, without compromising the flexibility of eSIM operation. | 03-27-2014 |
20140099925 | METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK - Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security. | 04-10-2014 |
20140222688 | APPARATUS AND METHODS FOR SECURE ELEMENT TRANSACTIONS AND MANAGEMENT OF ASSETS - Methods and apparatus for the deployment of financial instruments and other assets are disclosed. In one embodiment, a security software protocol is disclosed that guarantees that the asset is always securely encrypted, that one and only one copy of an asset exists, and the asset is delivered to an authenticated and/or authorized customer. Additionally, exemplary embodiments of provisioning systems are disclosed that are capable of, among other things, handling large bursts of traffic (such as can occur on a so-called “launch day” of a device). | 08-07-2014 |
20140298018 | APPARATUS AND METHODS FOR DISTRIBUTING AND STORING ELECTRONIC ACCESS CLIENTS - Apparatus and methods for efficiently distributing and storing access control clients within a network. In one embodiment, the access clients include electronic Subscriber Identity Modules (eSIMs), and an eSIM distribution network infrastructure is described which enforces eSIM uniqueness and conservation, distributes network traffic to prevent “bottle necking” congestion, and provides reasonable disaster recovery capabilities. In one variant, eSIMs are securely stored at electronic Universal Integrated Circuit Card (eUICC) appliances which ensure eSIM uniqueness and conservation. Access to the eUICC appliances is made via multiple eSIM depots, which ensure that network load is distributed. Persistent storage is additionally described, for among other activities, archiving and backup. | 10-02-2014 |
20140349705 | VIRTUAL ACCESS MODULE DISTRIBUTION APPARATUS AND METHODS - Apparatus and methods for distributing electronic access client modules for use with electronic devices. In one embodiment, the access client modules are virtual subscriber identity modules (VSIMs) that can be downloaded from online services for use with cellular-equipped devices such as smartphones. The online services may include a point of sale (POS) system that sells electronic devices to users. A broker may be used to facilitate the selection of a virtual subscriber identity module. A provisioning service may also be used to provision the selected VSIM. | 11-27-2014 |
20150031413 | ELECTRONIC ACCESS CLIENT DISTRIBUTION APPARATUS AND METHODS - Apparatus and methods for distributing access control clients. In one exemplary embodiment, a network infrastructure is disclosed that enables delivery of electronic subscriber identity modules (eSIMs) to secure elements (e.g., electronic Universal Integrated Circuit Cards (eUICCs), etc.) The network architecture includes one or more of: (i) eSIM appliances, (ii) secure eSIM storages, (iii) eSIM managers, (iv) eUICC appliances, (v) eUICC managers, (vi) service provider consoles, (vii) account managers, (viii) Mobile Network Operator (MNO) systems, (ix) eUICCs that are local to one or more devices, and (x) depots. Moreover, each depot may include: (xi) eSIM inventory managers, (xii) system directory services, (xiii) communications managers, and/or (xiv) pending eSIM storages. Functions of the disclosed infrastructure can be flexibly partitioned and/or adapted such that individual parties can host portions of the infrastructure. Exemplary embodiments of the present invention can provide redundancy, thus ensuring maximal uptime for the overall network (or the portion thereof). | 01-29-2015 |
20150074780 | METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS - Disclosed herein is a technique for securely provisioning access control entities (e.g., electronic Subscriber Identity Module (eSIM) components) to a user equipment (UE) device. In one embodiment, a UE device is assigned a unique key and an endorsement certificate that can be used to provide updates or new eSIMs to the UE device. The UE device can trust eSIM material delivered by an unknown third-party eSIM vendor, based on a secure certificate transmission with the unique key. In another aspect, an operating system (OS) is partitioned into various sandboxes. During operation, the UE device can activate and execute the OS in the sandbox corresponding to a current wireless network. Personalization packages received while connected to the network only apply to that sandbox. Similarly, when loading an eSIM, the OS need only load the list of software necessary for the current run-time environment. Unused software can be subsequently activated. | 03-12-2015 |
20150222635 | APPARATUS AND METHODS FOR CONTROLLED SWITCHING OF ELECTRONIC ACCESS CLIENTS WITHOUT REQUIRING NETWORK ACCESS - Methods and apparatuses for providing controlled switching of electronic access control clients without requiring network access are set forth herein. In one embodiment, a method for swapping of subscriptions and/or profiles for electronic Subscriber Identity Modules (eSIMs) without network supervision that prevents possibly malicious high frequency switching is disclosed. The disclosed embodiments offer reasonable management capabilities for network operators, without compromising the flexibility of eSIM operation. | 08-06-2015 |
20150256345 | REVOCATION OF ROOT CERTIFICATES - Disclosed herein is a technique for revoking a root certificate from at least one client device. In particular, the technique involves causing a secure element—which is included in the at least one client device and is configured to store the root certificate as well as at least one backup root certificate—to permanently disregard the root certificate and prevent the at least one client device from utilizing the specific root certificate. According to one embodiment, this revocation occurs in response to a receiving a revocation message that directly targets the root certificate, where the message includes at least two levels of authentication that are verified by the secure element prior to carrying out the revocation. Once the root certificate is revoked, the secure element can continue to utilize the at least one backup root certificate, while permanently disregarding the revoked root certificate. | 09-10-2015 |
20150312698 | METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK - Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security. | 10-29-2015 |
20150326568 | APPARATUS AND METHODS FOR STORING ELECTRONIC ACCESS CLIENTS - Apparatus and methods for storing and controlling access control clients. In one embodiment, transmitting and receiving devices ensure that only one copy of an eSIM is active at any time. Specifically, each transferred eSIM is encrypted for the destination device; the eSIM from the source device is deleted, deactivated, or otherwise rendered unusable. Various aspects of network infrastructure are also described, including electronic Universal Integrated Circuit Card (eUICC) appliances, and mobile devices. Various scenarios for transfer of eSIMs are also disclosed. | 11-12-2015 |
20150341791 | ELECTRONIC SUBSCRIBER IDENTITY MODULE PROVISIONING - A method for preparing an eSIM for provisioning is provided. The method can include a provisioning server encrypting the eSIM with a symmetric key. The method can further include the provisioning server, after determining a target eUICC to which the eSIM is to be provisioned, encrypting the symmetric key with a key encryption key derived based at least in part on a private key associated with the provisioning server and a public key associated with the target eUICC. The method can additionally include the provisioning server formatting an eSIM package including the encrypted eSIM, the encrypted symmetric key, and a public key corresponding to the private key associated with the provisioning server. The method can also include the provisioning server sending the eSIM package to the target eUICC. | 11-26-2015 |
20160006729 | METHODS AND APPARATUS FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL - A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The method involves establishing symmetric keys that are ephemeral in scope. Specifically, an off-card entity, and each eUICC in a set of eUICCs managed by the off-card entity, possess long-term Public Key Infrastructure (PKI) information. When a secure communication channel is to be established between the off-card entity and an eUICC, the eUICC and the off-card entity can authenticate one another in accordance with the respectively-possessed PKI information (e.g., verifying public keys). After authentication, the off-card entity and the eUICC establish a shared session-based symmetric key for implementing the secure communication channel. Specifically, the shared session-based symmetric key is generated according to whether perfect or half forward security is desired. Once the shared session-based symmetric key is established, the off-card entity and the eUICC can securely communicate information. | 01-07-2016 |
20160044493 | SIMULACRUM OF PHYSICAL SECURITY DEVICE AND METHODS - Described herein is a simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in conjunction with a software emulation of the security device. In one implementation, a “faux SIM card” is provided that does not contain Subscriber Identification Module (SIM) information itself, but instead enables a user to download Electronic SIM (eSIM) information (e.g., from a network or eSIM server) which is loaded into a software emulation of a Universal Integrated Circuit Card (UICC) device. The faux card is printed with an activation code, scan pattern, or other activation or access information. The subscriber purchases the faux card, and enters the activation code into a device; the entered activation code enables the device to log onto a network, and download the appropriate eSIM data. Delivery of eSIM information as enabled by the faux card addresses deficiencies in existing SIM distribution schemes, provides users with an enhanced perception of security, and further addresses various legal requirements. | 02-11-2016 |
20160057624 | ENFORCING SERVICE POLICIES IN EMBEDDED UICCs - The embodiments set forth techniques for an embedded Universal Integrated Circuit Card (eUICC) to conditionally require, when performing management operations in association with electronic Subscriber Identity Modules (eSIMs), human-based authentication. The eUICC receives a request to perform a management operation in association with an eSIM. In response, the eUICC determines whether a policy being enforced by the eUICC indicates that a human-based authentication is required prior to performing the management operation. Next, the eUICC causes the mobile device to prompt a user of the mobile device to carry out the human-based authentication. The management operation is then performed or ignored in accordance with results of the human-based authentication. | 02-25-2016 |
20160063260 | POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL - A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities. | 03-03-2016 |
Jerry Hauck, Windemere, FL US
Patent application number | Description | Published |
---|---|---|
20080307245 | Methods and systems to dynamically manage performance states in a data processing system - Methods and apparatuses to dynamically manage a performance state of a data processing system are described. The data processing system includes a plurality of components; one or more buses coupled to the plurality of components, and a dynamic performance state manager unit coupled to the components. The dynamic performance state manager unit is configured to receive information about a first plurality of current states of components of the system. The dynamic performance state manager unit is configured to determine a second plurality of required system performance states for the components; and to determine a current system performance state based on the first plurality and the second plurality. | 12-11-2008 |
John Hauck, Shoreview, MN US
Patent application number | Description | Published |
---|---|---|
20150223729 | SYSTEM AND METHOD FOR ASSESSING DIMENSIONS AND ECCENTRICITY OF VALVE ANNULUS FOR TRANS-CATHETER VALVE IMPLANTATION - A system for detecting the dimensions and geometry of a native valve annulus for trans-catheter valve implantation includes a compliant balloon and a shaft within the balloon. One or more drive electrodes may be affixed to a surface of the balloon, and one or more sense electrodes may be affixed to the shaft. After insertion of the balloon into the native valve annulus, the drive electrodes may be energized with a predetermined voltage. Using a trained statistical model and the voltages measured at the sense electrodes, initial estimates of the cross-section of the valve annulus may be obtained. The initial estimates may then be provided to an optimization model of the valve annulus to obtain a highly accurate prediction of the cross-section of the valve annulus. | 08-13-2015 |
John Hauck, Gloucester, MA US
Patent application number | Description | Published |
---|---|---|
20090130267 | METHOD OF OPTIMIZING NUTRITIONAL VALUE OF SEEDS - A method of optimizing the nutritional content of seeds to create nutritionally enriched foodstuffs for consumption by both humans and animals alike. Seeds are germinated under controlled conditions amenable to large scale, high-throughput commercial processing, and their germination is arrested at the apex of germination, where they have achieved peak nutritional value. Arrested germination seeds can be consumed directly, or dried for long term storage and later use. Additionally, nutritionally optimized seeds can be popped or puffed to create nutritionally enriched snack foods. | 05-21-2009 |
John Anderson Hauck, Shoreview, MN US
Patent application number | Description | Published |
---|---|---|
20140275920 | Devices and Methods for Catheter Localization - A medical device can be localized by providing at least three non-colinear localization elements (e.g., electrodes) thereon. Once placed in a non-ionizing localization field, three adjacent localization elements, at least one of which will typically be a spot electrode, may be selected, and the non-ionizing localization field may be used to measure their locations. A cylinder is defined to fit the measured locations of the selected localization elements. The cylinder is rotationally oriented using the measured location of a spot electrode. Location and rotational attitude information may be used to construct a three-dimensional representation of the medical device within the localization field. The electrodes may be provided on the medical device or on a sheath into which the medical device is inserted. The invention also provides systems and methods for identifying and calibrating deflection planes where the medical device and/or sheath are deflectable. | 09-18-2014 |
John Francis Hauck, Gloucester, MA US
Patent application number | Description | Published |
---|---|---|
20080274249 | Nutritious corn / nutritious popcorn, nutritious peas, nutritious beans, nutritious lentils, nutritious rice, nutritious barley, nutritious oats, nutritious wheat - Corn, beans, peas, soy beans, lentils, wheat, and barley (grains and legumes) have much greater nutritional value if the seeds are first germinated and, then, the germination is terminated before the root is developed. | 11-06-2008 |
John M. Hauck, Bridgman, MI US
Patent application number | Description | Published |
---|---|---|
20140267679 | INDENTATION HARDNESS TEST SYSTEM HAVING AN AUTOLEARNING SHADING CORRECTOR - An indentation hardness test system is provided that includes: a frame including an attached indenter; a movable stage for receiving a part attached to the frame; a camera; a display; a processor; and a memory subsystem. The processor performs the steps of: (a) capturing images of different portions of the part; (b) for each image, computing an average intensity; (c) computing an average intensity across all images; (d) for each pixel, computing PixelAverageDelta | 09-18-2014 |
Karl P. Hauck, Pembroke, NH US
Patent application number | Description | Published |
---|---|---|
20100188832 | MAGNETIC SHIELD FOR USE IN A LOCATION SENSING SYSTEM - An energy transfer apparatus with a magnetic shield is configured to magnetically couple energy from a fixed location to a mobile or moveable device within a field-activated space of the energy transfer apparatus. Apparatuses include a location sensing surface and a drive coil arranged in relation to a periphery of the location sensing surface. A magnetic shield plate is disposed below the location sensing surface and the drive coil. The shield plate includes a number of radially oriented slots originating at, and distributed about, a periphery of the shield plate. | 07-29-2010 |
20120000717 | UNTETHERED STYLUS EMPLOYING MULTIPLE REFERENCE FREQUENCY COMMUNICATION - An untethered stylus is configured to cooperate with a location sensing device that generates a drive signal. The stylus includes transceiver circuitry disposed in a housing, which is configured to receive the drive signal and transmit a stylus signal for reception by the location sensor. Energy circuitry is disposed in the housing and energized by the drive signal. A reference frequency generator, disposed in the housing and coupled to the transceiver circuitry and energy circuitry, is configured to generate a number of reference frequencies based on a source frequency of the drive signal, the reference frequencies indicative of a number of stylus states and synchronized to the source frequency of the drive signal. The transceiver circuitry is configured to mix the reference frequencies with the stylus signal. | 01-05-2012 |
Lane Hauck, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20100008174 | Adaptive training and adjustment to changing capacitor values based upon age and usage behavior - An apparatus includes logic to determine a discharge drop of a capacitor and to adjust an enablement charge level of the capacitor according to the discharge drop. | 01-14-2010 |
20120224445 | Apparatus and method to measure energy capacity of a backup power supply without compromising power delivery - A device includes a backup power supply configured to provide power to an external system upon loss of primary system power. The backup power provided by at least one capacitor. While the capacitor is available as a backup power supply to the external system, a transient elevation of the capacitor's stored potential is created above an upper predetermined operating potential of the capacitor. Measurements of a capacitor's output voltage are obtained during the transient elevation of the capacitor's stored potential. A capacitance of the capacitor is determined from the measurements. | 09-06-2012 |
20120224446 | Capacitor Charge Balance System - “A circuit includes a series arrangement of capacitor stages, each stage including a single capacitor or a plurality of capacitors in parallel, the series arrangement configured such that each capacitor stage receives charge current via a common charging terminal. A controller is configured to separately measure a stored potential of each capacitor stage in the series arrangement. The circuit includes logic to selectively remove a controlled amount of charge from each capacitor stage individually (discharge logic), and logic to operate the discharge logic to maintain each capacitor stage in the series arrangement at a substantially equal stored potential (balancing logic).” | 09-06-2012 |
Lane T. Hauck, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20080316371 | APPLIANCE REMOTE CONTROL APPARATUS AND METHOD OF USING SAME - A remote control apparatus and method of using are disclosed for controlling an electronic appliance such as a television set, radio, computer, or other. The remote control apparatus may include a hand held housing, a wireless transmitter for sending signals to the appliance, and a manually operated rotary controller for causing operation adjusting signals to be generated and supplied to the transmitter. | 12-25-2008 |
20130310124 | METHOD AND APPARATUS FOR FACILITATING PLAYING AN ELECTRONIC GAME - A method and apparatus facilitates playing an electronic game using a group of game devices. A sequence of musical melody notes are generated forming a melody after all players have previously received on their game devices a recognition sequence of certain musical notes which form a portion of the musical melody notes. Stop signals on one or more of the game devices are then generated. Incrementally quantifying reaction time signals are generated relative to the playing of the last musical note corresponding to the recognition sequence for each game device. A score for each game device may be generated for each round in response to the reaction time signal. | 11-21-2013 |
20150016206 | APPARATUS AND METHOD TO MEASURE ENERGY CAPACITY OF A BACKUP POWER SUPPLY WITHOUT COMPROMISING POWER DELIVERY - A device includes a backup power supply configured to provide power to an external system upon loss of primary system power. The backup power provided by at least one capacitor. While the capacitor is available as a backup power supply to the external system, a transient elevation of the capacitor's stored potential is created above an upper predetermined operating potential of the capacitor. Measurements of a capacitor's output voltage are obtained during the transient elevation of the capacitor's stored potential. A capacitance of the capacitor is determined from the measurements. | 01-15-2015 |
Mark Hauck, Corvallis, OR US
Patent application number | Description | Published |
---|---|---|
20120312345 | SYSTEM AND METHOD FOR THERMAL PROTECTION OF AN ELECTRONICS MODULE OF AN ENERGY HARVESTER - A thermoelectric energy harvesting system may include a thermoelectric generator and an electronics module. The thermoelectric generator may produce a voltage in response to a temperature difference across the thermoelectric generator and generate power when coupled to a load. The system may include a housing mounted on top of the thermoelectric generator. The housing may include a cavity containing the electronics module. The electronics module may condition the power generated by the thermoelectric generator. The cavity may be enclosed by an inner surface of the housing. A radiation shield may cover at least a portion of the inner surface and may block radiative heating of the cavity from the housing. | 12-13-2012 |
Mark J. Hauck, Corvallis, OR US
Patent application number | Description | Published |
---|---|---|
20130327370 | ENERGY HARVESTER WTIH IMPROVED HEAT FLOW ARRANGEMENT - A thermoelectric energy harvesting system may include a thermoelectric generator that may produce a voltage in response to a temperature difference across the thermoelectric generator. The thermoelectric generator may be captured between the housing and the base member. The system may include at least one mechanical fastener coupling the housing to the base member and including a shoulder spacer formed of thermally-insulating material and positioned under the mechanical fastener. | 12-12-2013 |
20140137570 | VARIABLE THERMAL RESISTANCE MOUNTING SYSTEM - A variable-thermal-resistance mounting system may include a cylinder coupled to a heat source, or heat load and a rod movably engaged to the cylinder and coupled to a remaining one of the heat source and heat load. The rod may be coupled to a heat load. The rod may be axially slidable relative to the cylinder between a collapsed position and an extended position in a manner causing a change in heat flow between the heat source and the heat load such that the warm-side temperature of the heat load is initially set at a substantially optimal value. | 05-22-2014 |
20140326287 | WEARABLE THERMOELECTRIC GENERATOR ASSEMBLY AND METHOD OF MANUFACTURING SAME - A thermoelectric generator module for a wearable thermoelectric generator assembly may include a top heat coupling plate and a bottom heat coupling plate each having a head formed on an outer surface of the heat coupling plate and thermally conductive strips formed on an inner surface. At least one thermoelectric foil may be interposed between the top and bottom heat coupling plate. A perimeter band may circumscribe the perimeter edges of the top and bottom heat coupling plate and encapsulate the thermoelectric foil. The head of at least one of the top and bottom heat coupling plate may protrude beyond upper and/or lower surfaces of the perimeter band. | 11-06-2014 |
Scott Hauck, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110301918 | DATA ACQUISITION FOR POSITRON EMISSION TOMOGRAPHY - A method for estimating the start time of an electronic pulse generated in response to a detected event, for example the start time for pulses received in response to photon detection in positron emission tomography, includes providing a detector that detects an external event and generates an electronic analog pulse signal. A composite reference pulse curve is calculated to represent analog pulse signals generated by the detector. Upon receiving an analog pulse signal, it may be filtered, and then digitized, and normalized based on the area of the digital signal. Using at least one point of the normalized digital pulse signal, the composite reference pulse curve shape is used to estimate the pulse start time. | 12-08-2011 |
Sheila Hauck, Lincoln, MA US
Patent application number | Description | Published |
---|---|---|
20160130281 | COMPOUNDS AND METHODS FOR TREATING BACTERIAL INFECTIONS - Compounds of formula (I), pharmaceutically acceptable salts thereof, and uses of the compounds of formula (I) for treating bacterial infections are disclosed. | 05-12-2016 |
Sheila Irene Hauck, Waltham, MA US
Patent application number | Description | Published |
---|---|---|
20080269214 | Pyrrole Derivatives as Dna Gyrase and Topoisomerase Inhibitors - Compounds of formula (I) and their pharmaceutically acceptable salts are described: Formula (I). Processes for their preparation, pharmaceutical compositions containing them, their use as medicaments and their use in the treatment of bacterial infections are also described. | 10-30-2008 |
20090253671 | TRICYCLIC DERIVATIVES OF AZETIDINE AND PYRROLE WITH ANTIBACTERIAL ACTIVITY - Compounds of formula (I) and their pharmaceutically acceptable salts are described. Processes for their preparation, pharmaceutical compositions containing them, their use as medicaments and their use in the treatment of bacterial infections are also described. | 10-08-2009 |
20100137243 | Oxazolidinone And/Or Isoxazoline As Antibacterial Agents - Compounds of Formula (I), or a pharmaceutically-acceptable salt, or an in-vivo-hydrolysable ester thereof, and compounds as shown in Formula (I) wherein C is for example (D), (E), (F); wherein A and B are independently selected from (i) and (ii); R | 06-03-2010 |
20100179150 | ANTIBACTERIAL PIPERDINE DERIVATIVES - Compounds of formula (I) and their pharmaceutically acceptable salts are described. Processes for their preparation, pharmaceutical compositions containing them, their use as medicaments and their use in the treatment of bacterial infections are also described. | 07-15-2010 |
20110245224 | FUSED, SPIROCYCLIC HETEROAROMATIC COMPOUNDS FOR THE TREATMENT OF BACTERIAL INFECTIONS - The present invention relates to compounds of Formula (I); to pharmaceutically acceptable salts thereof, to methods of using them to treat bacterial infections, and to methods for their preparation. | 10-06-2011 |
20130150366 | CHEMICAL COMPOUNDS - Compounds of formula (I) and their pharmaceutically acceptable salts are described. Processes for their preparation, pharmaceutical compositions containing them, their use in the treatment of bacterial infections are also described. | 06-13-2013 |
20140128371 | CHEMICAL COMPOUNDS 542 - The present invention relates to compounds of Formula (I): | 05-08-2014 |
20140206677 | COMPOUNDS AND METHODS FOR TREATING BACTERIAL INFECTIONS - Compounds of formula (I), pharmaceutically acceptable salts thereof, and uses of the compounds of formula (I) for treating bacterial infections are disclosed. | 07-24-2014 |
20150203513 | COMPOUNDS AND METHODS FOR TREATING BACTERIAL INFECTIONS - Compounds of formula (I), pharmaceutically acceptable salts thereof, and uses of the compounds of formula (I) for treating bacterial infections are disclosed. | 07-23-2015 |
20150368266 | CHEMICAL COMPOUNDS 542 - The present invention relates to compounds of Formula (I): | 12-24-2015 |
Wallace N. Hauck, Caldwell, ID US
Patent application number | Description | Published |
---|---|---|
20140163652 | METHOD FOR TREATING AND REPAIRING MITRAL VALVE ANNULUS - A catheter system for repairing an annular organ structure of a patient, comprising: intimately contacting the annular organ structure by a tissue-contactor member having energy-delivering elements; and delivering tissue-shrinkable energy at the annular organ structure through the elements, wherein the tissue-shrinkable energy is applied at a distance wirelessly from the elements sufficient to shrink and tighten the organ structure. Tissue-shrinkable energy is infrared energy, ultrasound energy, focused ultrasound energy, ultrasound energy, radiofrequency energy, microwave energy, electromagnetic energy, laser energy, or a combination thereof. | 06-12-2014 |
Wallace Neil Hauck, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20090270858 | CARDIAC VALVE LEAFLET ATTACHMENT DEVICE AND METHODS THEREOF - A medical device system comprising a guide catheter and a leaflet fastening applicator, the guide catheter having suitable dimensions for deployment and insertion percutaneously into a human heart in a vicinity of a heart valve, the leaflet fastening applicator having a size allowing insertion through the guide catheter and being capable of holding portions of opposing heart valve leaflets, wherein the fastening applicator comprises a pair of grasping-electrodes adapted for holding and engaging the portions of opposing heart valve leaflets together and for applying energy to fasten the portions, in which heart valve leaflets can be captured and securely fastened, thereby improving coaptation of the leaflets and improving competence of the valve. | 10-29-2009 |
20110178596 | CARDIAC VALVE LEAFLET ATTACHEMENT DEVICE AND METHODS THEREOF - A medical device system comprising a guide catheter and a leaflet fastening applicator, the guide catheter having suitable dimensions for deployment and insertion percutaneously into a human heart in a vicinity of a heart valve, the leaflet fastening applicator having a size allowing insertion through the guide catheter and being capable of holding portions of opposing heart valve leaflets, wherein the fastening applicator comprises a pair of grasping-electrodes adapted for holding and engaging the portions of opposing heart valve leaflets together and for applying energy to fasten the portions, in which heart valve leaflets can be captured and securely fastened, thereby improving coaptation of the leaflets and improving competence of the valve. | 07-21-2011 |